Vulnerability Assessments

Great Essays
Introduction
I. Vulnerability Assessments (Or “What do we have of value that must be protected?”)
A. The Company Network

Figure 1: Existing Company Network
1. Physical Devices
a) The NETGEAR MR814 Wireless Router (all versions) has two key vulnerabilities. First, the MR814 only supports Wired Equivalent Privacy (WEP) encryption to secure traffic sent over the wireless network [1]. WEP has numerous, well documented vulnerabilities and exploits. In its standard implementation, WEP can be compromised easily with a brute-force approach. If a longer key is used, weaknesses in the WEP protocol allow an attacker to utilize other methods to decrypt all of the traffic sent on the wireless network [2]. There are multiple, easily available tools
…show more content…
Wireless networks are vulnerable to remote exploit by an attacker, due to their use of radio frequencies (RF) to transmit data between endpoints. With a wireless network, an attacker does not have to physically connect to any of the network devices in order to gain access. They do not even have to be inside the same room or building. An attacker can sit outside of a building, but still be within the range of the wireless access point (WAP). With a high gain antenna and directional transmitter, an attacker can connect to a WAP from beyond its normal range. An attacker who drives around scanning for WAPs to exploit is conducting an attack known as “wardriving”. In one case, three men were indicted for stealing “credit card numbers and payroll information via businesses’ wireless networks, enabling them to steal more than $750,000 in cash and computer equipment” …show more content…
Federal: The following are a sampling of federal laws that often apply to businesses that maintain an individual’s personal and financial information.
a) The Federal Rules of Civil Procedure (FRCP), Title V, Disclosures and Discovery, Rule 34, specifies that a party in a civil procedure be able:
“to produce and permit the requesting party or its representative to inspect, copy, test or sample the following items in the responding party’s possession, custody, or control: (A) any designated documents or electronically stored information – including… data or data compilations – stored in any medium from which information can be obtained…” [9].
The current structure of the organization’s network, especially the lack of direct control over email records, effective data storage and a backup / archival strategy, makes the company potentially unable to appropriately respond to lawful requests for information in civil procedures. Failure to comply with the court order can result in the company being held in contempt of court and associated penalties being applied

Related Documents

  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    A captive portal forces a device connecting to the wireless network to display a specific web page, before allowing access to the Internet [57]. This web page should be customized to show company information, and require guests to accept a user agreement before being permitted access to the Internet through company resources. In addition, the captive portal will direct the guest to get the current Wi-Fi password from the company receptionist. The Cisco 500 Series Wireless Access Point comes with a built-in, customizable captive portal…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    It operates in the 2.4GHz band and supports up to 11 Mbps. The range goes up to around several hundred feet in theory. It was the first real consumer option for wireless and very popular. 802.11g – Similar to 802.11b, it operates in the 2.4GHz band and therefore meaning it is compatible with the 802.11b equipment. It can also achieve a maximum of 54 Mbps.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Hacker access, activist access, an insider attack. Hacker access involves an outside entity gaining access to the network via unpatched systems, vulnerability, or by any other technical means. Activist access consists of a hacker affecting the network maliciously with a political or moral agenda in mind. Insider attack can be the most dangerous of the three. This involves someone within the organization do harm to the network using the credential or access they were granted to perform their regular duties.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Merritt's Case

    • 270 Words
    • 2 Pages

    Merritt's monthly cash receipts, additional incremental costs, Marketing Expenses, and Start-Up Expenses. Plaintiff is reviewing its records and will supplement its production with any additional responsive documents located. Interrogatory No. 14: Identify and describe all meetings and communications between any representative of Plaintiff and Dr. Merritt after Dr. Merritt began work for Cornerstone up through your filing of this lawsuit. Supplemental Response: Plaintiff incorporates by reference its general and specific objections and response to this interrogatory found within Plaintiff’s Responses to Third-Party Defendant’s First Interrogatories.…

    • 270 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    1) Eavesdropping: It can be defined as secretly listening to the private conversation of others without their consent. Here an attacker can choose to passively eavesdrop on the network communication and steal the data. Through passive eavesdropping attackers apparently eliminate their presence in the network and make such attacks difficult to detect. The goal of such an attack is to violate the confidentiality of the communications by intercepting the network and sniffing or listening to the routing packets. Also, an adversary can actively influence the communication channel by disrupting, jamming or modifying the network packets and/or inserting false packets into the network.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Aclu V. Holder Case Study

    • 272 Words
    • 2 Pages

    provisions limit the relator only from publicly discussing the filing of the qui tam complaint,” but that “[n]othing in the FCA prevents the qui tam relator from disclosing the existence of the fraud.” Id. (citing ACLU v. Holder, 673 F.3d 245, 254 (4th Cir. 2011). The Fifth Circuit has also stated that “nothing in the text of § 3730(b)(2) explicitly authorizes dismissal [of an FCA action] as a sanction for disclosures in violation of the seal requirement.” Id. Accordingly, Physician’s argument that the seal in his qui tam lawsuit somehow prohibits him from giving a deposition in this state court lawsuit is unsupported and contradictory to established Fifth Circuit precedent.…

    • 272 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Frequency-hopping is used in wifi, meaning that without it, we wouldn't have laptops or any of our wireless phones. Imagine talking with your friends for hours on the phone, sitting at the kitchen table, having your siblings eavesdropping on you the whole time. Imagine walking down the street and not being able to take a phone right out of your pocket and being able to call your parents to come and pick you up, instead you would have to find a phone, most likely wait in line to use it, and pay for one phone call. We wouldn't have a lot of the privileges we have today without Hedy Lamar's idea of frequency-hopping. Global Positioning Systems, also known as GPS's, also use frequency-hopping.…

    • 531 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    In identifying whether an organization is a Zero-Based Organization or a World-Class Organization, in relation to its’ homeland security profile, an assessment team would review and assign a score to each area of an organization’s strategic and business needs. It is especially important for the assessment team members to consider the Baldrige Scoring Guidelines and validate their score against the Homeland Security Scoring Profile to ensure that together both, the Baldrige Scoring Guidelines and the Homeland Security Scoring Profiles, adequately describe the organization’s homeland security preparedness level that each question addresses throughout the assessment” (Fisher, 2004). Once the assessment team has assigned a score to each of the…

    • 599 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    Record360, Inc. Notice of Privacy Policy At Record360, we value your privacy and we are committed to respecting your privacy rights. We pledge to handle your personal information fairly and legally at all times. Record360 is also dedicated to being transparent about what personal information we collect and how we use it. This policy describes how we handle and use personal information; what personal information we collect; how we collect personal information; how we ensure your privacy is maintained; and your legal rights relating to your personal information.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The theses of the TED talk “The power of vulnerability”, by Brené Brown , is that we all struggle with vulnerability in our lives; we fail to truly express ourselves and allow ourselves to be deeply seen, for the fear of not being accepted. But it is when we can truly accept who we are, and recognize our worth, that we can finally embrace vulnerability. Brown uses a humorous and an intimate tone in her Ted talk, to point out her struggle with vulnerability. These two tones are visible when Brown gets personal about her struggle with vulnerability, leading her to go see a therapist as she had a “breakdown”, but as intimate as she gets about her life, she still has a very humorous tone, keeping the audience entertained at the same time.…

    • 603 Words
    • 3 Pages
    Improved Essays